PT-2026-37092 · Redis · Redis-Server

Emil Lerner

·

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-25243

CVSS v4.0

7.7

High

VectorAV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions redis-server versions prior to 8.6.3
Description Redis is an in-memory data structure store. The RESTORE command fails to properly validate serialized values. An authenticated attacker with permissions to execute this command can provide a crafted serialized payload, triggering invalid memory access which may lead to remote code execution.
Recommendations Update to version 8.6.3. Restrict access to the RESTORE command using ACL rules as a temporary workaround.

Fix

Heap Based Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2026-25243

Affected Products

Redis-Server